Sciweavers

1720 search results - page 88 / 344
» eg 2008
Sort
View
AINA
2008
IEEE
15 years 11 months ago
Reputation of Communities of Web Services - Preliminary Investigation
Web services communities can be seen as virtual clusters that agglomerate Web services with the same functionality (e.g., FlightBooking). However, selecting a community to deal wi...
Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jam...
CDC
2008
IEEE
15 years 11 months ago
Weight selection for gap robustness with degree-constrained controllers
— In modern robust control, control synthesis may be cast as an interpolation problem where the interpolant relates to robustness and performance criteria. In particular, robustn...
Johan Karlsson, Tryphon T. Georgiou, Anders Lindqu...
131
Voted
COLCOM
2008
IEEE
15 years 11 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
COMPSAC
2008
IEEE
15 years 11 months ago
Dealing with the Crosscutting Structure of Software Architectural Styles
Architecture-based software development is the implementation of a software system in terms of its architectural constructs (e.g., components, connectors, ports). It has been show...
Sam Malek
CSFW
2008
IEEE
15 years 11 months ago
DKAL: Distributed-Knowledge Authorization Language
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
Yuri Gurevich, Itay Neeman